SDxCentral’s new Research Brief on Edge Computing aims to provide insights into the most common pitfalls in building out the edge and provides recommendations on how to maximize success at the Edge for operators.
SDxCentral’s new Research Brief on Edge Computing aims to provide insights into the most common pitfalls in building out the edge and provides recommendations on how to maximize success at the Edge for operators.
Conventional wisdom tells us that a network that never breaks is the most resilient, but practice tells us otherwise. In this episode we explore the value of chaos engineering and how breaking your network intentionally can make it stronger.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 33 – The Importance Of Breaking Things appeared first on Network Collective.
The firm says Kubernetes is still a "three-star wizard to figure out," but abstraction could help ease deployment pains.
Technology upheaval is challenging current network architects while opening new job opportunities for newcomers.
I stumbled upon an article with an interesting title (and worth reading): To Make Self-Driving Cars Safe, We Also Need Better Roads and Infrastructure… and thought about the claims along the lines of “if they managed to solve the self-driving cars challenge, it’s realistic to expect self-driving networks” made in Self-Driving Networks podcast episode. Turns out the self-driving cars problem is far far away from being solved.
Read more ...The ninth edition of Africa Peering and Interconnection Forum (AfPIF) kicked off today, with more than 400 tech executive in attendance.
This year, the forum was organized and held jointly with iWeek- South Africa ISP Association’s premier tech event. The event is underway at the Cape Town International Convention Center.
This year’s event is dubbed AfPIF@iWeek has attracted tech executives, chief technology officers, peering coordinators and business development managers, Internet service providers and operators, telecommunications policymakers and regulators, content providers, Internet Exchange Point (IXP) operators, infrastructure providers, data center managers, National Research and Education Networks (NRENs), carriers, and transit providers.
The sessions started with an introduction by Nishal Goburdhan, a veteran of AfPIF, who traced the history of AfPIF, from its conception to the community event it is. The community took over the program three years ago, determining the speakers and the conference content.
How can you take advantage of AfPIF? Nishal suggested that the participants use peering personals sessions; this is like speed dating for networks – members give details of their AS numbers, where they peer, peering policy, contact information, and explain why other participants should peer with them. At the end of every session, participants get a Continue reading
You can now refresh 1.1.1.1’s DNS cache for domain names by using the purge cache tool. This is useful for domain owners who have updated their DNS records and want to make sure it is reflected for people who are using 1.1.1.1 as their public DNS resolver.
When a client queries for a domain against 1.1.1.1, the resolver returns the IP address from its cache. The cache TTL for a DNS entry is 3 hours. If the host specifies a cache TTL that is shorter than 3 hours, the resolver respects that. This means, when a domain owner changes the DNS host from one to another, in the worst case, she will have to wait for at least 3 hours before the old IP address expires from 1.1.1.1’s cache. With the help of the purge cache tool, a domain owner can now easily refresh 1.1.1.1’s DNS cache and will not have to wait for the cached entry to expire.
To purge a DNS record, you enter the name of your domain, pick the DNS record type and hit the ‘Purge Cache’ button.
You can Continue reading
The cloud service gives companies visibility and mobility across all of their secondary data and applications from a single dashboard. It also uses machine learning and analytics to power a bunch of new infrastructure management features.
I grew up with DOS and Windows 3.1. I remember applications being fast - instant feedback or close to it. Today, native applications like Outlook or Apple Mail still feel fast - click compose and the window is there instantly and it feels snappy. Internet applications do not.
My first Internet experience was paying $30 for a prepaid card with 10 hour access over a 14.4k modem. First, it was bulletin boards and later IRC and the WWW. From my small seaside town in Australia, the Internet was a window into the wider world, but it was slooooooow. In a way, it didn’t matter. The world of opportunities the Internet opened up, from information to music, to socializing and ecommerce, who cared if it was slow? The utility of the Internet and Internet applications meant I would use them regardless of the experience.
Performance improved from the 90s, but in 2008 when I switched from Outlook downloading my Yahoo! email over IMAP to Gmail in the browser, it wasn’t because it was faster - it wasn’t - it was because features like search, backed up mail, and unlimited storage were too good to resist. The cloud computing power Continue reading
The firm sees constant and long-term updates as key to maintaining edge and IoT security.
The following is a guest post by Xavier Lacot, a developer at redirection.io and founder at JoliCode. He works primarily on Web and mobile projects as a consultant, trainer and technical expert.
Redirection.io is a Web traffic redirection manager. It provides a collection of tools for website administrators, SEO agencies, and developers, which help analyze HTTP errors, setup HTTP redirections, customize HTTP responses, and monitor the traffic efficiently.
The main part of a traditional redirection.io setup is the proxy, a software component which parses every request to check if a redirection or another response override is required. This "proxy" can be of several types - we provide libraries in several languages - but this setup can be simplified for Cloudflare clients by taking advantage of Cloudflare Workers.
Earlier this year, Cloudflare unveiled its Workers product, a smart way of running code on the edge of Cloudflare locations. This computing feature is particularly interesting, as it allows performing several traffic operations without requiring any change on your own platform, code, or infrastructure: just enable Workers, write some code, and let Cloudflare handle the magic ✨
In practical terms, Workers Continue reading
Keysight and NTT DoCoMo have been collaborating on 5G research since 2015 when the two companies worked on mmWave channel measurement.